General
-
Target
ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093
-
Size
12KB
-
Sample
240522-zlh41agb66
-
MD5
ac9c7da8a3ceb190eda4c1627360e0e0
-
SHA1
8a0c76711c41d5d1c714f6ba73e28aa1e318313d
-
SHA256
ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093
-
SHA512
1f4583aecdfaeda0f26d46f9bbe071ba50167ae26c47133aa28e7c7671e8f41940e7aed3e6214160c14308d9afbfd04235f3b2b8de1ccd19e415511d5b0f11dc
-
SSDEEP
192:9ZL29RBzDzeobchBj8JONTON9wruTrEPEjr7AhU:9529jnbcvYJOwIuTvr7CU
Static task
static1
Behavioral task
behavioral1
Sample
ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093.xll
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093.xll
Resource
win11-20240508-en
Malware Config
Extracted
Targets
-
-
Target
ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093
-
Size
12KB
-
MD5
ac9c7da8a3ceb190eda4c1627360e0e0
-
SHA1
8a0c76711c41d5d1c714f6ba73e28aa1e318313d
-
SHA256
ec667c42221a498e3565986360fed666a379671fb279f4fb442a89a054ea0093
-
SHA512
1f4583aecdfaeda0f26d46f9bbe071ba50167ae26c47133aa28e7c7671e8f41940e7aed3e6214160c14308d9afbfd04235f3b2b8de1ccd19e415511d5b0f11dc
-
SSDEEP
192:9ZL29RBzDzeobchBj8JONTON9wruTrEPEjr7AhU:9529jnbcvYJOwIuTvr7CU
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-